Top 10 cyber security predictions for 2017

Phoenix, Az (USA)

Beyondtrust, a leading cyber security company specialists in helping to prevent privilege misuse and stopping unauthorised access, has boldly made 10 technology predictions for 2017, along with five technology events to watch for in the next five years.

The cyber security threat landscape continuously grows in complexity and scope, leading to new attacks, innovations, regulations and security measures every year. As the Internet of Things continues to change the world and the way people live, it will also continue to open threat possibilities for all connected devices, whether they be consumer products or industrial systems. 2017 will be no different – a year of change, growth, and advancement.

And in the next five years, technological threats and innovation may drive us to a world we scarcely recognise, for good and for bad. Imagine the implications of compromised self-driving cars. Consider embedded identification technology, powered by the human body in which it resides, giving two-factor identification new meaning. Five years could bring the end of privacy laws, operating systems and anti-virus software. "Might we even see a video game take down the North Korean regime?" speculates Beyondtrust.

The following are Beyondtrust’s top 10 technology predictions for 2017:

1. The first state cyber-attack will be conducted and acknowledged as an act of war. 2017 will see the first large scale attack by one nation against another, and be acknowledged as an attack and the techniques used considered as weapons.

2. Password re-use will fade, out of necessity. Re-using passwords, one of the most dangerous user practices, will take centre stage amid large security breaches, convincing more people to use unique passwords.

3. The Internet of Things (IoT) will come under government scrutiny and require manufacturers to tighten security. Manufacturers will be forced to tighten security, including patchable firmware/software, secured authentication, and controlled privilege access, driven by large scale attacks using IoT.

4. Commercialised anti-DDoS will emerge. Following constant DDoS attacks above the 500GB mark, a new startup that directly attacks and patches botnet systems will launch in an unregulated country, and patch a hundred million hosts.

5. Behavioural technologies will be embedded into new technologies. Pressure, typing speed and fingerprints will be used to advance biometric recognition to protect devices from cyber crime.

6. Adaptive and behaviour-based authentication will grow in importance. Mobility, cloud deployments and increased regulation will drive innovation in identity verification.

7. Tor v2 will come online. Since the government has infiltrated the Tor network, companies will start to setup cross-country file transfer networks, moving toward a fully encrypted, clear text network.

8. Compliance concerns will drive growth in the endpoint and device market. A hard stance on outdated software accessing banking systems will knock user acceptance down 40 percent, but increase the purchase of new computers, Chrome books, mobile devices, and tablets that are more secure than older systems.

9. Known vulnerabilities will continue to be exploited. Most attacks will begin with an exploit taking advantage of a known vulnerability where a patch has been readily available.

10. Cloud vendors will increase security measures. Attacks on cloud platforms, workloads, and enterprise SaaS applications will convince organisations to expand their privileged access management budgets.

Looks like we need to buckle up and get ready for a tumultuous year ahead in the cyber security realm!


Business News

Strong growth ahead for two factor authentication market

As users become more concerned about the safety of their data, two factor authentication, or, TFA is gaining momentum. According to research analysts at Technavio, the global market was valued at $4.73 billion in 2016, and is expected to reach 13.63 billion by 2021 at a CAGR of 23.57%. Currently North America has the largest share of the market at 36.79%, but Europe will likely make the highest contribution to the market’s growth with a CAGR of 24.19%.

Business News

It didn’t take long to see the results, the jail caught somebody throwing contraband over the back fence shortly after the installation was completed.

New IP surveillance catches contraband smugglers at county jail

Colquitt County jail in South Georgia, needed to make some significant upgrades to their surveillance infrastructure if they were going to fulfill their obligation to not only keep the Colquitt County public safe, but the inmate population as well. The previous black and white analogue system had become outdated and no longer met their requirements and so a completely new video system from Pelco by Schneider Electric was selected to renew and upgrade the system using the latest IP video surveillance technology.

Business News

Vivotek solution benefits enforcement system in Argentina

Until Vialseg developed a new system, the traffic light enforcement system in Argentina relied on devices based on physical inductive loops installed under the pavement and a physical connection to the traffic light controller. This traffic light enforcement system without a physical connection to the street and traffic lights created constant down time, and resulted in a lack of captured violations due to road maintenance or lost connection with the traffic light itself as two common examples.

Product News

Surveon releases comprehensive residential solutions

Many people are opting to live in a residential community nowadays so as to enjoy a higher quality of life whilst taking advantage of cost-sharing. As a result, the security in such communities becomes critical for residents. Surveon offers a professional surveillance solution for residential applications, including high-resolution cameras, enterprise hardware RAID NVR as well as enterprise VMS with active VI detection, which has a pre-configured base for a number of scenarios, ensuring rapid and accurate action to protect family and assets from potential threats.

Product Suppliers
Back to top